From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Successive refinement based Wyner-Ziv video compression., , , , и . Signal Process. Image Commun., 25 (1): 47-63 (2010)Halftone image watermarking via optimization., , , , и . Signal Process. Image Commun., (2016)Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion., , и . ACM Multimedia, стр. 1063-1066. ACM, (2015)On reachability graphs of Petri nets., , и . Comput. Electr. Eng., 29 (2): 263-272 (2003)Image Reconstruction from Local Descriptors Using Conditional Adversarial Networks., , и . APSIPA, стр. 1773-1779. IEEE, (2019)Privacy-Preserving distributed deep learning based on secret sharing., , и . Inf. Sci., (2020)Bi-level Protected Compressive Sampling., , , и . IEEE Trans. Multim., 18 (9): 1720-1732 (2016)Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images., , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (1): 23:1-23:18 (января 2023)Toward Visual Behavior and Attention Understanding for Augmented 360 Degree Videos., , , , , , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (2s): 99:1-99:24 (2023)Improved known-plaintext attack to permutation-only multimedia ciphers., , , , , и . Inf. Sci., (2018)